General
-
Target
5e404d9e781d1e35d4a3e329636c5ee4cd61d496b018e1cddee7bb2330b1a4a0.exe
-
Size
120KB
-
Sample
241207-dfs65ayjfk
-
MD5
e0ac075adc6a44f7d86009513b5499d9
-
SHA1
5447e31126854f99150e7e136d3d02d8fe5fb1a1
-
SHA256
5e404d9e781d1e35d4a3e329636c5ee4cd61d496b018e1cddee7bb2330b1a4a0
-
SHA512
e5a6ea540187a933968751333e82896536769ca194dcac57306f31e51a7894899d18b3fdc5c4ca1b1ec3a8a95a33e3986b75666d9404ccb16a50d096649b7e56
-
SSDEEP
1536:kl6P4N51ykto3XvzGbUgXVthzcRDeKd1EGiziHIeuYNIfTkfipm5:vdkQfzGYgXVthcKMStz82KIvpm5
Static task
static1
Behavioral task
behavioral1
Sample
5e404d9e781d1e35d4a3e329636c5ee4cd61d496b018e1cddee7bb2330b1a4a0.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
5e404d9e781d1e35d4a3e329636c5ee4cd61d496b018e1cddee7bb2330b1a4a0.exe
-
Size
120KB
-
MD5
e0ac075adc6a44f7d86009513b5499d9
-
SHA1
5447e31126854f99150e7e136d3d02d8fe5fb1a1
-
SHA256
5e404d9e781d1e35d4a3e329636c5ee4cd61d496b018e1cddee7bb2330b1a4a0
-
SHA512
e5a6ea540187a933968751333e82896536769ca194dcac57306f31e51a7894899d18b3fdc5c4ca1b1ec3a8a95a33e3986b75666d9404ccb16a50d096649b7e56
-
SSDEEP
1536:kl6P4N51ykto3XvzGbUgXVthzcRDeKd1EGiziHIeuYNIfTkfipm5:vdkQfzGYgXVthcKMStz82KIvpm5
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5